Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
22
views
16
references
Top references
cited by
15
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
5,454
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Strongly Unforgeable Signatures Based on Computational Diffie-Hellman
other
Author(s):
Dan Boneh
,
Emily Shen
,
Brent Waters
Publication date
(Print):
2006
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Computational epistasis
Most cited references
16
Record
: found
Abstract
: not found
Book Chapter
: not found
Efficient Identity-Based Encryption Without Random Oracles
Brent Waters
(2005)
0
comments
Cited
153
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Short Signatures Without Random Oracles
Dan Boneh
,
Xavier Boyen
(2004)
0
comments
Cited
128
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Article
: not found
Short Signatures from the Weil Pairing
Dan Boneh
,
Ben Lynn
,
Hovav Shacham
(2004)
0
comments
Cited
122
times
– based on
0
reviews
Review now
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2006
Pages
: 229-240
DOI:
10.1007/11745853_15
SO-VID:
e6978361-89ae-4847-9d71-3ef484bd2311
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
New Attacks on RSA with Small Secret CRT-Exponents
pp. 14
An Attack on a Modified Niederreiter Encryption Scheme
pp. 27
Cryptanalysis of an Efficient Proof of Knowledge of Discrete Logarithm
pp. 44
Efficient Polynomial Operations in the Shared-Coefficients Setting
pp. 58
Generic On-Line/Off-Line Threshold Signatures
pp. 75
Linear Integer Secret Sharing and Distributed Exponentiation
pp. 91
Encoding-Free ElGamal Encryption Without Random Oracles
pp. 105
Parallel Key-Insulated Public Key Encryption
pp. 123
Provably Secure Steganography with Imperfect Sampling
pp. 140
Collision-Resistant No More: Hash-and-Sign Paradigm Revisited
pp. 157
Higher Order Universal One-Way Hash Functions from the Subset Sum Assumption
pp. 174
An Algorithm to Solve the Discrete Logarithm Problem with the Number Field Sieve
pp. 191
Efficient Scalar Multiplication by Isogeny Decompositions
pp. 229
Strongly Unforgeable Signatures Based on Computational Diffie-Hellman
pp. 241
Generalization of the Selective-ID Security Model for HIBE Protocols
pp. 257
Identity-Based Aggregate Signatures
pp. 274
On the Limitations of the Spread of an IBE-to-PKE Transformation
pp. 290
Inoculating Multivariate Schemes Against Differential Attacks
pp. 302
Random Subgroups of Braid Groups: An Approach to Cryptanalysis of a Braid Group Based Cryptographic Protocol
pp. 315
High-Order Attacks Against the Exponent Splitting Protection
pp. 330
New Online/Offline Signature Schemes Without Random Oracles
pp. 347
Anonymous Signature Schemes
pp. 364
The Power of Identification Schemes
pp. 378
Security Analysis of KEA Authenticated Key Exchange Protocol
pp. 395
SAS-Based Authenticated Key Agreement
pp. 410
The Twist-AUgmented Technique for Key Exchange
pp. 427
Password-Based Group Key Exchange in a Constant Number of Rounds
pp. 443
Conditional Oblivious Cast
pp. 458
Efficiency Tradeoffs for Malicious Two-Party Computation
pp. 474
On Constructing Certificateless Cryptosystems from Identity Based Encryption
pp. 491
Building Better Signcryption Schemes with Tag-KEMs
pp. 508
Security-Mediated Certificateless Cryptography
pp. 525
k-Times Anonymous Authentication with a Constant Proving Cost
Similar content
5,454
Provably authenticated group Diffie-Hellman key exchange
Authors:
Emmanuel Bresson
,
Olivier Chevassut
,
David Pointcheval
…
Efficient algorithms for supersingular isogeny Diffie-Hellman
Authors:
C Costello
,
P. Longa
,
M Naehrig
HMQV: a high-performance secure Diffie-Hellman protocol
Authors:
H. Krawczyk
See all similar
Cited by
15
Strongly Unforgeable Signatures and Hierarchical Identity-Based Signatures from Lattices without Random Oracles
Authors:
Markus Rückert
Computing on Authenticated Data: New Privacy Definitions and Constructions
Authors:
Nuttapong Attrapadung
,
Benoit Libert
,
Thomas Peters
Efficient Zero-Knowledge Contingent Payments in Cryptocurrencies Without Scripts
Authors:
Wacław Banasik
,
Stefan Dziembowski
,
Daniel Malinowski
See all cited by